8 Privacy Features iOS 14 Users Need to Know

8 Privacy Features iOS 14 Users Need to Know

Certain apps will request local network access the first time you launch them after the update.Some apps will try to use your camera or microphone for certain reasons even when they don’t need that access.

Five iOS 14 and iPadOS 14 security and privacy features you need to know about

Five iOS 14 and iPadOS 14 security and privacy features you need to know about

Also, if you access Control Center, there's a notice at the top showing you recent apps that have accessed the camera or microphone.Apps requesting local network access.Another thing that you'll see after installing iOS 14/iPadOS 14 is apps requesting local network access.

Server Leak exposes users of dating site network

Server Leak exposes users of dating site network

vpnMentor researchers said the database stored copies of push notifications that various online sites were sending to their users via Mailfire's push notification service.

App tells if office workers are not socially distanced

App tells if office workers are not socially distanced

image copyrightMind The Gap. image captionThe app sends a notification if you are too close to your colleaguesAlthough many contact-tracing apps have found it hard to accurately detect distances with Bluetooth, Hack Partners says the combination of the technology with audio measuring, gives an accuracy of between 6-8cm.

>4,000 Android apps silently access your installed software

>4,000 Android apps silently access your installed software

More than 4,000 Google Play apps silently collect a list of all other installed apps in a data grab that allows developers and advertisers to build detailed profiles of users, a recently published research paper found.

Health Data Breach Not Reported for Seven Months

Health Data Breach Not Reported for Seven Months

While HIPAA covered entities and business associates are required to investigate all security incidents, a '"breach" is not determined until the entities confirm that "acquisition, access, use or disclosure of PHI in a manner not permitted [under the regulations] which compromises the security or privacy of the PHI" occurred, she notes.

T-Mobile Discloses Data Breach Impacting Prepaid Customers

T-Mobile Discloses Data Breach Impacting Prepaid Customers

T-Mobile said today in a data breach notification that the account information of an undisclosed number of customers using the company's prepaid services was accessed by an unauthorized third-party.

The State of State Data Laws, Part 1: Data Breach Notification Laws

The State of State Data Laws, Part 1: Data Breach Notification Laws

Either way, data breach notification laws that require companies to tell customers when data have been exposed are intended to enable consumers to make choices about what to do when such events happen and protect themselves if their information was compromised.

Massive Spam Operation Uncovered In A Database Leak

Massive Spam Operation Uncovered In A Database Leak

The structure of the records left almost no doubts on the malicious nature of the dataset: IP with database was hosted on a domain called ‘‘ which is blacklisted by Spamhaus – an international nonprofit organization that tracks spam and related cyber threats.

Firefox 67 to display breach alerts

Firefox 67 to display breach alerts

Mozilla plans to extend the functionality of Firefox Monitor by displaying breach alerts to users of the browser. The feature was passive at that time; users could check whether an account -- email address -- was found on hacked passwords lists, and they could sign up to receive alerts when a particular account was discovered on new leaked lists.

Reducing WhatsApp Digital Footprint in the Age of Facebook

Reducing WhatsApp Digital Footprint in the Age of Facebook

We will be using this feature to isolate WhatsApp. Go to Android > Settings > System > Multiple Users and add a new user. Whitelist by default means only selected groups of people would be on your contact list, significantly reducing the ability of WhatsApp to build social graphs of your daily lives.

1-800-Surveillance State: Agencies Can Snoop On Any Computer, Says Centre

1-800-Surveillance State: Agencies Can Snoop On Any Computer, Says Centre

Highlights Home Ministry gives 10 central agencies sweeping powers Can now intercept, monitor data on any computer, not just emails, calls Includes Intelligence Bureau, anti-narcotics and tax agencies

Facebook bug exposed up to 6.8M users’ unposted photos to apps

Facebook bug exposed up to 6.8M users’ unposted photos to apps

Facebook tells TechCrunch it discovered the breach on September 25th, and informed the European Union’s privacy watchdog the Office Of The Data Protection Commissioner (IDPC) on November 22nd. Curiously, Facebook discovered the bug on September 25th, the same day as its 30 million user breach.

Data breach laws: would you know if your personal information was compromised?

Data breach laws: would you know if your personal information was compromised?

For example, HIPAA (the Health Insurance Portability and Accountability Act) is federal United States legislation that includes additional breach notification and reporting requirements for the healthcare industry.

Firefox Monitor Launches in 26 Languages and Adds New Desktop Browser Feature

Firefox Monitor Launches in 26 Languages and Adds New Desktop Browser Feature

Specifically, we are adding a notification to our Firefox Quantum browser that alerts desktop users when they visit a site that has had a recently reported data breach.

Walmart patents creepy internet-connected shopping carts that can measure your heart rate

Walmart patents creepy internet-connected shopping carts that can measure your heart rate

The retail giant filed a patent for a internet-connected shopping cart that can measure and track biometric data. From there, it would be able to alert store associates that a customer needs a hand, based on the biometric data they received from the shopping cart handle.

F-Droid - Free and Open Source Android App Repository

F-Droid - Free and Open Source Android App Repository

Because of the privacy and security concerns that naturally go along with this, we did not send any info in the notification messages with the old app (which, understandably, led to complaints by our users). When opening the connection, the client sends the list of users for which it wants to receive notifications.

Infographic: A Look At Data Breach Laws By State

Infographic: A Look At Data Breach Laws By State

A data breach is “the unauthorized acquisition of covered information that compromises security, integrity or confidentiality," according to software company Digital Guardian. How strict are your state’s data breach laws?” Digital Guardian said.